Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600051-6.doi: 10.11896/jsjkx.240600051
• Information Security • Previous Articles Next Articles
XIA Zhuoqun1, ZHOU Zihao1, DENG Bin2, KANG Chen3
CLC Number:
[1]WU K H,LI Y,CHEN F,et al.A method for describing industrial control system network attack using object Petrinet[J].IEEE Transactions on Electrical and Electronic Engineering,2016,11(2):216-227. [2]ZHAO W B.Research on the Network Security Monitoring System of Smart Water Conservancy Internet of Things[J].Water Resources Informatization,2021(4):39-46. [3]LI Y J,ZHANG J,YANG X,et al.Discovery of Water Conservancy Network Security Threats Based on Situation Awareness [C]//Proceedings of the 2020(Eighth) China Water Conservancy Informatization Technology Forum.2020:328-334. [4]RIGELSFORD J.Pattern recognition:Concepts,methods andapplications[J].Assembly Automation,2002,22(4). [5]DONG W,WANG G,YAN Q,et al.Design of Network Security Situation Awareness and Early Warning System Based on Big Data[C]//2023 International Conference on Networking,Informatics and Computing(ICNETIC).Palermo,Italy,2023:749-753. [6]CHANG L W,LIU X J,QIAN Y H,et al.A Network Security Situation Awareness Model Based on Multi-source Fusion of Convolutional Neural Networks [J].Computer Science,2023,50(5):382-389. [7]XIE L X,WANG Y C,YU J B.Network Security SituationAwareness Based on Neural Networks [J].Journal of Tsinghua University(Science and Technology),2013,53(12):1750-1760. [8]DUTT V,AHN Y S,GONZALEZ C.Cyber situation aware-ness:modeling detection of cyber attacks with instance-based learning theory[J].Human Factors,2013,55(3):605-618. [9]HU J,MA D,LIU C,et al.Network Security Situation Prediction Based on MR-SVM[J].IEEE Access,2019,7:130937-130945. [10]ALMEIDA R B,COVALSKI V,MACHADOR,et al.A hierarchical architectural model for network security exploring situational awareness[C]//Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.2019:1365-1372. [11]SI C,ZHANG H,WANG Y,et al.Network Security Situation Elements Fusion Method Based on Ontology[C]//2014 Seventh International Symposium on Computational Intelligence and Design.Hangzhou,China,2014:272-275. [12]JIA K,WANG L H,LIU D.Preliminary Exploration on theConstruction of the Network Security Situation Awareness System for the Hydrology of the Yangtze River [J].Express Water Resources & Hydropower Information,2021,42(3):79-84. [13]CAO Q.System Design and Application of the Intelligent Operation Center for Large-scale Water Diversion Projects [J].Water Resources Informatization,2022,6(1):65-70. [14]KONG Z J.Research on the Method and Application of Network Security Situation Awareness Based on D-S Evidence Theory [D].Hohhot:Inner Mongolia University,2022. [15]LUO Q Q.Research on Network Security Situation Awareness Based on D-S Theory [D].Nanjing:Nanjing University of Posts and Telecommunications,2021. [16]YANG H Y,ZENG R Y.A Network Security Situation Assessment Method Based on Deep Learning [J].Journal of Xidian University,2021,48(1):183-190. [17]GOH J,ADEPU S,JUNEJO K N,et al.A Dataset to Support Research in the Design of Secure Water Treatment Systems[C]//The 11th International Conference on Critical Information Infrastructures Security.Cham:Springer,2016. [18]Secure Water Treatment(SWaT) Testbed[EB/OL].https://itrust.sutd.edu.sg/itrust-labs_datasets/dataset_info/#swat. [19]国务院.《国家突发公共事件总体应急预案》(http://www.gov.cn/jrzg/2006-01/08/content_150878.htm),2006. |
[1] | LIN Zheng, LIU Sicong, GUO Bin, DING Yasan, YU Zhiwen. Adaptive Operator Parallel Partitioning Method for Heterogeneous Embedded Chips in AIoT [J]. Computer Science, 2025, 52(2): 299-309. |
[2] | ZHU Fukun, TENG Zhen, SHAO Wenze, GE Qi, SUN Yubao. Semantic-guided Neural Network Critical Data Routing Path [J]. Computer Science, 2024, 51(9): 155-161. |
[3] | HAN Bing, DENG Lixiang, ZHENG Yi, REN Shuang. Survey of 3D Point Clouds Upsampling Methods [J]. Computer Science, 2024, 51(7): 167-196. |
[4] | XU Xiaohua, ZHOU Zhangbing, HU Zhongxu, LIN Shixun, YU Zhenjie. Lightweight Deep Neural Network Models for Edge Intelligence:A Survey [J]. Computer Science, 2024, 51(7): 257-271. |
[5] | LI Wenting, XIAO Rong, YANG Xiao. Improving Transferability of Adversarial Samples Through Laplacian Smoothing Gradient [J]. Computer Science, 2024, 51(6A): 230800025-6. |
[6] | CHEN Meng, QIAN Rongrong, ZHU Yujia, HUANG Zhenguo. Method of Outdoor CSI Feedback for Massive MIMO Systems Based on Deep Autoencoder [J]. Computer Science, 2024, 51(11A): 231000191-6. |
[7] | CHANG Liwei, LIU Xiujuan, QIAN Yuhua, GENG Haijun, LAI Yuping. Multi-source Fusion Network Security Situation Awareness Model Based on Convolutional Neural Network [J]. Computer Science, 2023, 50(5): 382-389. |
[8] | REN Shuyao, SONG Jiangling, ZHANG Rui. Early Screening Method for Depression Based on EEG Signal [J]. Computer Science, 2023, 50(11A): 221100139-6. |
[9] | QIAN Dong-wei, CUI Yang-guang, WEI Tong-quan. Secondary Modeling of Pollutant Concentration Prediction Based on Deep Neural Networks with Federal Learning [J]. Computer Science, 2022, 49(11A): 211200084-5. |
[10] | FAN Hong-jie, LI Xue-dong, YE Song-tao. Aided Disease Diagnosis Method for EMR Semantic Analysis [J]. Computer Science, 2022, 49(1): 153-158. |
[11] | ZHOU Xin, LIU Shuo-di, PAN Wei, CHEN Yuan-yuan. Vehicle Color Recognition in Natural Traffic Scene [J]. Computer Science, 2021, 48(6A): 15-20. |
[12] | XIAO Rui, JIANG Jia-qi, ZHANG Yun-chun. Study on Semantic Topology and Supervised Word Sense Disambiguation of Polysemous Words [J]. Computer Science, 2019, 46(11A): 13-18. |
[13] | HAN Jia-lin, WANG Qi-qi, YANG Guo-wei, CHEN Jun, WANG Yi-zhong. SSD Network Compression Fusing Weight and Filter Pruning [J]. Computer Science, 2019, 46(11): 272-276. |
[14] | LIU Jin-shuo and ZHANG Zhi. Sentiment Analysis on Food Safety News Using Joint Deep Neural Network Model [J]. Computer Science, 2016, 43(12): 277-280. |
[15] | SI Cheng, ZHANG Hong-qi, WANG Yong-wei and YANG Ying-jie. Research on Network Security Situational Elements Knowledge Base Model Based on Ontology [J]. Computer Science, 2015, 42(5): 173-177. |
|